Vulnerability in WebKit browser engine impacts BlackBerry Device Software version 6.0 and later

This vulnerability has a Common Vulnerability Scoring System (CVSS) score of 6.8.

Impact
A vulnerability exists in the open source WebKit browser engine provided in BlackBerry Device Software version 6.0 and later. The issue could result in remote code execution on affected BlackBerry smartphones. Successful exploitation of the vulnerability requires the user to browse to a website that the attacker has maliciously designed. A successful exploit could allow the attacker to use the BlackBerry Browser to access user data stored on the media card and in the built-in media storage on the BlackBerry smartphone, but not to access user data that the email, calendar and contact applications store in the application storage (the internal file system that stores application data and user data) of the BlackBerry smartphone.

Application storage is the only place on a device from which applications can be run. Sections of application storage can store files that a user downloads or saves to device memory. Exploitation of the vulnerability does not allow access to this part of BlackBerry smartphone

Overview

Research In Motion is aware of recent reports of a vulnerability affecting the implementation of open source WebKit technology in the BlackBerry Browser in BlackBerry Device Software version 6.0 and later. This security notice communicates the following key facts:

The exploitation of the vulnerability was performed at the Pwn2Own 2011 Contest and is publicly known.

At the time of release of this security notice, the BlackBerry Security Incident Response Team has not received any reports that this vulnerability has been successfully exploited on a BlackBerry smartphone outside of a test environment or has resulted in any impact to BlackBerry customers.

A successful exploit could allow the attacker to use the BlackBerry Browser to access user data stored on the media card and in the built-in media storage on the BlackBerry smartphone, but not to access user data that the email, calendar and contact applications store in the application storage (the internal file system that stores application data and user data) of the BlackBerry smartphone.

Recommendation

Follow the available workarounds documented in this security notice.

Exercise caution when clicking on links to untrusted websites in browsers, email or instant messages.

Disable JavaScript use in the BlackBerry Browser

Users of BlackBerry Device Software version 6.0 and later can disable the use of JavaScript in the BlackBerry Browser to prevent exploitation of the vulnerability. The issue is not in JavaScript but the use of JavaScript is necessary to exploit the vulnerability.

Important: Turning off JavaScript may impact the ability to view web pages, or result in a diminished browsing experience.